Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 hack web jobs found, pricing in USD

    ...This task requires robust technical expertise, problem-solving abilities, and an innovative mindset to explore these systems. Key Requirements: - Profound understanding and experience in systems infrastructure - Solid experience manipulating operating systems, databases, and networks - Ability to penetrate systems with user-level access authentically and legally - Goals and Objectives: - The hack is for educational purposes only. Thus, the acquired knowledge will be used to further my understanding of the systems and will not be utilized for any unauthorized means. To the potential freelancer, your formal education or certifications in ethical hacking or a related field will be a significant advantage. However, if you're self-taught but can demonstrate your proficien...

    $28 / hr (Avg Bid)
    $28 / hr Avg Bid
    15 bids
    Trophy icon Non-Fiction Book Cover Design 1 day left

    I am looking for a talented graphic designer who can help create a book cover for my non-fiction piece. The main aim of the book is to impart life skills to teen boys, so the design should be visually appealing to this demographic, while still being attractive to adult readers. Key points: - The cover should be ...supported by a grapgic of unleashing (maybe a band? zipper?) - use graphics that are targeted to the audience - looking for an attention grabbing cover Book subtitle: 7 simple steps to forge solid friendships, master cooking & cleaning, uncover career planning hacks & more for a confident transition into manhood - please highlight the number 7 - please highlight "master cooking", "career planning hack" and "solid friendships" Pen n...

    $65 (Avg Bid)
    Guaranteed
    $65
    108 entries

    ...looking for a diligent and creative social media manager to regularly post dynamic content on Facebook, Instagram, and TikTok. This content will revolve around the theme of promoting a campaign for a hair education beauty summit. Key tasks will include: - Generating and posting engaging content randomly throughout the day. we want to post 2 to 3 times daily. - reels and just educational hack videos that shows what's to come; I have some script, but they would need to provide some script for us - Applying consistent branding and messaging across all platforms. Ideal candidates will have: we are promoting our @haireducationbeautysummit - Proven experience managing social media accounts for businesses, especially in the beauty and/or education sectors. ...

    $443 (Avg Bid)
    Urgent
    $443 Avg Bid
    62 bids

    Hi Tanmay, could you please investigate this site for malware. I will supply login credentials in chat.

    $16 / hr (Avg Bid)
    $16 / hr Avg Bid
    1 bids

    I'm in need of an hacker to perform a thorough black-box penetration testing on a WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are cr...

    $93 (Avg Bid)
    $93 Avg Bid
    29 bids

    I'm in need of an hacker to perform a thorough black-box penetration testing on my WordPress website. Key Responsibilities Include: - Testing the security from an outsider's perspective. - Identifying and using hacking techniques including SQL injections, cross-site scripting attacks, and brute force attacks to hack website as outsider so that we can plug the vulnerability. Ideal candidates should have: - Proven experience in website vulnerability testing. - A strong understanding of WordPress. - Exceptional problem-solving skills. - In-depth knowledge of SQL injections, cross-site scripting attacks, and brute force attacks. My objective is to ensure my website's robust security, and your expertise can help me to achieve this. Your keen eye and tech skills are c...

    $324 (Avg Bid)
    $324 Avg Bid
    23 bids

    ...purposes and to help formulate a proof of concept for a security system. The features I require are: - A custom login page - The ability to track user activity - Integration with other platforms The project will also involve demonstrating a successful XSS hacking. To accompany this, I'll need detailed documentation created to outline the steps taken and the vulnerabilities exploited. Following the hack, I expect to have full administrative access to the WordPress site. Ideal candidates for this project have a deep understanding of WordPress, its vulnerabilities, and security concepts in general, coupled with experience in XSS hacking and documentation writing. Advanced technical WordPress skills, expertise in frontend/backend development and strong background in cyber...

    $40 (Avg Bid)
    $40 Avg Bid
    28 bids

    As the owner and administrator of a Facebook page and multiple profiles, I am seeking an expert in Facebook's security protocol who can successfully and securely delete these accounts. This task is of utmost importance due to severe security concerns. There are no other platforms in need of attention; this job focuses solely on Facebook. Key requirements for this project are: -Legitimate knowledge of Facebook's security and deletion procedures - Experience in maintaining client privacy and confidentiality - Assurance that deleted data will not be recoverable - Proof of successful past experiences in similar tasks

    $39 (Avg Bid)
    $39 Avg Bid
    14 bids

    I urgently require help to predict a cryptographic-based random number generator, or RNG, which is used in a casino setting. I have output sequences of the RNG that can be utilized f...hopeful you can create an algorithm or a model to predict the next sequences. ## What You Should Have: - Extensive experience with RNGs, especially those that are based in cryptography, is absolutely crucial for this project. - Experience in creating predictive algorithms or models. - Good understanding of gambling methodologies would be a plus. - Understand that the goal is not to exploit or hack, but to generate effective gambling strategies. Persons with matched skills and experience, I look forward to your proposals. and also if you have some insights ....... it from "' �...

    $70 / hr (Avg Bid)
    $70 / hr Avg Bid
    5 bids

    ...Modeling Requirements: MSGARCH Model Configuration: The analysis requires the implementation of a MSGARCH model to capture the dynamic volatility of each cryptocurrency. The model must accommodate two distinct regimes: High-Volatility Regime (Regime 1): Characterized by periods surrounding significant market events expected to induce heightened market volatility. Examples include the Coincheck Hack (January 2018), the 2018 Cryptocurrency Market Crash, Black Thursday (March 2020), the 2021 Chinese Cryptocurrency Mining Ban, the Collapse of TerraUSD and LUNA (May 2022), and the FTX Bankruptcy (November 2022). Low-Volatility Regime (Regime 2): Represents periods of relative market stability, with lower volatility not significantly influenced by immediate external shocks. The model...

    $138 (Avg Bid)
    $138 Avg Bid
    18 bids

    ...Modeling Requirements: MSGARCH Model Configuration: The analysis requires the implementation of a MSGARCH model to capture the dynamic volatility of each cryptocurrency. The model must accommodate two distinct regimes: High-Volatility Regime (Regime 1): Characterized by periods surrounding significant market events expected to induce heightened market volatility. Examples include the Coincheck Hack (January 2018), the 2018 Cryptocurrency Market Crash, Black Thursday (March 2020), the 2021 Chinese Cryptocurrency Mining Ban, the Collapse of TerraUSD and LUNA (May 2022), and the FTX Bankruptcy (November 2022). Low-Volatility Regime (Regime 2): Represents periods of relative market stability, with lower volatility not significantly influenced by immediate external shocks. The model...

    $594 (Avg Bid)
    $594 Avg Bid
    33 bids

    Looking for a Skilled Web Developer with knowledge of API and web hack stuff which can get done the task easily , its not a simple job for a fresher we need someone who can get gone the task in any way

    $96 (Avg Bid)
    $96 Avg Bid
    64 bids

    I'm in need of a specialist who can design an anti-hack solution integrated with Unity for Android and iOS platforms. The solution must: - Identify all applications running in the background. Essential skills: knowledge of Android and iOS system processes, experience with app behavior and detection. - Capture a complete screenshot of the cellphone and not only the game. - Collect data and generate a report upon detection of suspicious applications running in the background. This requires data collection, analysis, and reporting skills. Ideal candidates should have previous experience with similar projects, exclusively handling anti-hack measures, specifically on Unity. Strong understanding of both Android and iOS platforms is a must.

    $362 (Avg Bid)
    $362 Avg Bid
    57 bids

    We have several hightail charts that we need to convert to responsive for modern websites. These are from a 3rd party so we can't create the chart differently. My hope is that an expert developer can look at our code and understand how to create a solution / hack. The charts update automatically. Example sizes of the same chart attached. It will not allow me to paste Also, image versions of the chart could work too.

    $12 / hr (Avg Bid)
    $12 / hr Avg Bid
    23 bids

    ...job: - Strong experience in IT support - Knowledge of network setup and configuration - Proficiency in software and hardware installation - Solid background in ethical hacking and internet security. Let's ensure the security of my home network! I have a small home business where I work with sensitive client information. My internet provider is Google Fiber. I’m looking for someone to ethically hack my home internet to view all incoming/outgoing data & provide me with a detailed list of 4-5 days of information. This will help me to understand what kind of information others would be able to see on my home internet if they had intermediate/advanced hacking knowledge. Then I’ll be able to fix that & patch any needed areas. Need: 4-5 full days of dat...

    $151 (Avg Bid)
    $151 Avg Bid
    17 bids

    I need a professional with strong experience dealing with hacked WordPress websites. Under this project, your responsibilities would include: - Cleaning and restoring my hacked WordPress website from the recently available backup. - Enhancing the post-recovery security to prevent further hacking attempts. - Potentially identifying areas most impacted by the hack, as I'm unsure of specific areas. General skills and experience: - Proven track record with WordPress. - Specific experience dealing with recovery from hacking attacks. - Knowledgeable about preventative measures against hacking. - Experience in website backups and restoration.

    $179 (Avg Bid)
    $179 Avg Bid
    43 bids

    ...Pulldown One Arm Lat Pulldown One Arm Seated Cable Row Cable Pull Through Cable Kickback Cable Lateral Raise Cable Reverse Fly Face Pull Cable External Rotation Cable Crunch Cable Woodchopper Cable Shrug Chest Press Machine Chest Fly Seated Dip Machine Machine Tricep Extension Machine Bicep Curl Machine Row Machine Back Extension Sled Leg Press Horizontal Leg Press Leg Extension Seated Leg Curl Hack Squat Lying Leg Curl Machine Calf Raise Vertical Leg Press Seated Calf Raise Hip Abduction Hip Adduction Sled Press Calf Raise Machine Shoulder Press Machine Reverse Fly Machine Lateral Raise Machine Seated Crunch...

    $211 (Avg Bid)
    $211 Avg Bid
    59 bids

    WordPress Publishing We are publishing courses in WordPress for education and training. The content is fine and being source...the content and the general template is agreed then your job is to assembly each course and test for bugs and final sign-off. So basically, it is a publishing process and testing/proofing to make sure all is okay then releasing for commercial usage. This is similar to any publishing operation. I need a person who is fluent in English and a graduate. This job will not suit the average computer code hack who is not interested in content. To apply and be considered - you will have experience in WordPress, MemberPress, and plug-ins to make courses with paywalls. If you cannot show me an example then you will be not considered so don't waste your time ap...

    $22 / hr (Avg Bid)
    $22 / hr Avg Bid
    223 bids

    I run a B2B website that currently needs solid IP blocking strategies to prevent unauthorized access. I've recently noticed some suspicious activities that indicate hack attempts. Given these factors, I am after a seasoned web security expert who can: - Assess the situation and recommend viable solutions - Implement an IP blocking solution to prevent these unauthorized access attempts - Create a strategy to routinely monitor for and address such threats Ideal skills and experiences would include a strong background in website security, experience with B2B websites, and familiarity with preventing hack attempts.

    $130 (Avg Bid)
    $130 Avg Bid
    21 bids

    ...corporation's headquarters which is out of state to meet diversity requirements? 2) Hacking into a privately owned website and placing malware on the site: The corporation's motive was to squash public knowledge of their illegal and unethical behavior which the plaintiff's website shared plus give pointers of how to best sue defendant if there was cause. 3) Civil rights issues because the website hack restricted the site owner's free speech as users' anti-malware software prevented them from visiting it or adversely affected their computers 4) Conspiracy charges because in a large corporation there must have been >1 person approving, planning and hacking. 5) Way of stating/showing sufficient proof for “preponderance of evidence” when al...

    $259 (Avg Bid)
    $259 Avg Bid
    23 bids

    Hi. I want to remove lazyload on I tried the following - tried motion effects per field - tried elementor settings - lazyload inactive - tried javascript hack - tried add_filter( 'wp_lazy_loading_enabled', '__return_false' ); If you know how to do this, please start with the words lazyload There is also an a zoom hover effect close to the footer. I know i could just remake this as columns, but prefer to disable the zoom animation for now if you know how to do this.

    $19 (Avg Bid)
    $19 Avg Bid
    18 bids

    I urgently need assistance in dealing with a suspected Japanese keyword hack issue in my Laravel app. Noticed the problem following a sudden dip in Google search rankings, and unfortunately, I haven't made any progress in addressing it. Here are some key user requirements: - Full administrative access to the system will be granted to troubleshoot and resolve this issue. - Efficiently identifying and eliminating the Japanese keyword hack issue. - Insuring minimal downtime during the mitigation process. Ideal skills and expertise: - Extensive experience in Laravel application security. - Prior experience dealing with Japanese keyword hacks. - Proficiency in analyzing and rectifying Google search rankings related issues. - Should have good Laravel application server mana...

    $32 (Avg Bid)
    $32 Avg Bid
    6 bids

    For our Hack the North 2022 submission, the rise of Web3 lead us to explore a new topic in web development that all of us were unfamiliar with. We created Receipt3.0, a full-stack application that allows businesses to create digital receipts that exist on the Ethereum blockchain. The idea of the project focused on decentralization, where individuals had ownership of their own receipts, and can use it to refund their bought products. These receipt tokens would exist on the user's MetaMask wallet. We built smart contracts using Solidity and tested everything on the Ganache network. The frontend was created using React and Chakra-UI, while the backend used Express, Node, and MongoDB to store data. Here is code: For now my previous developer can't working

    $51 / hr (Avg Bid)
    $51 / hr Avg Bid
    39 bids

    ...23 HOURS I'm currently grappling with a redirection hack on two of my WordPress websites. Visitors are being redirected to unintended pages, likely due to malware infection. The malware's specifics, however, are still unclear to me. I'm seeking a freelancer with expertise in malware removal and website security to address and resolve this issue promptly. Key Requirements: - *Malware Analysis & Removal:* Identify and fully remove all traces of the redirection hack and any other potential threats from both sites. - *WordPress Security Hardening:* Implement measures to enhance the security of my websites, preventing future attacks. - *Website Restoration:* Ensure that my websites return to their original functioning state before the hack, with al...

    $154 (Avg Bid)
    $154 Avg Bid
    76 bids

    ...eliminate the need for third party involvement. Registration requirements: Centralized exchanges require customers to comply with Know Your Customer regulations enforced by the U.S. Treasury, while decentralized exchanges do not require this. Security: Centralized exchanges are more frequent targets of malicious actors, whereas the decentralized nature of DEXs makes them relatively difficult to hack. Privacy: Decentralized exchanges do not share transaction data with any third party. DEX users also do not disclose any personal information. Trading volume: Trading activity on centralized exchanges still far outweighs the trading volume on DEXs. Decentralized exchanges currently account for only about 5% of the global crypto trading volume. Number of supported tokens: Decentralized...

    $1237 (Avg Bid)
    $1237 Avg Bid
    57 bids

    From time to time, the wordpress php files will be hacked and overwritten. I have recovered website but would like to find out the root cause of the hack place so that it doesn't happen again.

    $104 (Avg Bid)
    $104 Avg Bid
    108 bids

    I'm seeking a skilled mobile app developer to hack my Candy Crush on Android. This special modification should enable two primary features: unlocking all game levels and facilitating free in-game purchases. The timeline is tight, and I need it done within a week. **Key Requirements:** - Expertise in Android app development and modification. - Previous experience with game hacks or similar projects. - Ability to work swiftly and efficiently, completing the project in under a week. - Strong understanding of Candy Crush game mechanics is a plus. **Project Deliverables:** - A reliable hack that unlocks all levels in Candy Crush for Android. - Enable free in-game purchases without affecting game performance or stability. - Ensure the solution is discreet and minimizes th...

    $19 (Avg Bid)
    $19 Avg Bid
    6 bids

    I'm looking for a tech-savvy and reliable professional who can design and implement advanced features for the Rave application. Key Responsibilities: - Design effective hack strategies to wrest leadership from other active rooms in Rave - Incorporate additional operation options in existing Rave features Ideal Skills and Experience: • Extensive experience in application development • Familiarity with the Rave app's architecture and features • Excellent problem-solving abilities • Proven track record of successful application hacks The goal is to create a superior user experience via additional in-app features. Please be prepared to showcase similar projects or hacks in your portfolio. The ideal candidate will deliver this project in a timely, re...

    $556 (Avg Bid)
    $556 Avg Bid
    64 bids

    I'm looking for a skilled ethical hacker to embark on a unique project, aimed not just at identifying security vulnerabilities but for reasons beyond the usual scope. My priority is to approach this project with a fresh perspective, focusing on safeguarding our systems in innovative ways. **Objectives** - Beyond traditional security checks, this project craves innovation in protecting our digital frontier. - The omission of enhancing data privacy, ensuring compliance, or improving our security posture doesn't mean these aren't under consideration; our approach, however, prioritizes pioneering methodologies. **Timeline** - Completion is set within a month, providing sufficient time to delve deep while ensuring opportunistic threats are mitigated promptly. **Ideal Skills an...

    $73 (Avg Bid)
    $73 Avg Bid
    4 bids

    I'm currently grappling with a redirection hack on two of my WordPress websites. Visitors are being redirected to unintended pages, likely due to malware infection. The malware's specifics, however, are still unclear to me. I'm seeking a freelancer with expertise in malware removal and website security to address and resolve this issue promptly. Key Requirements: - **Malware Analysis & Removal:** Identify and fully remove all traces of the redirection hack and any other potential threats from both sites. - **WordPress Security Hardening:** Implement measures to enhance the security of my websites, preventing future attacks. - **Website Restoration:** Ensure that my websites return to their original functioning state before the hack, with all c...

    $142 (Avg Bid)
    $142 Avg Bid
    64 bids

    I'm seeking a mobile security expert to ensure my iPhone is free from any hacks and to implement measures to prevent future compromises. My phone currently shows signs of being hacked, highlighted by receiving strange messages or calls. Despite not recalling the installation of suspicious apps recently, I need professional help to address and rectify these concerns. **Key Responsibilities:** - Conduct a thorough security audit of my iPhone - Identify any malicious software or activity - Remove any identified threats securely - Advise and implement preventive measures against future hacking attempts **Ideal Skills & Experience:** - Proficient in iOS security protocols - Experienced in malware detection and removal on iOS - Knowledgeable in securing devices against unauthorized ac...

    $270 (Avg Bid)
    $270 Avg Bid
    20 bids

    We are seeking 15-20 + years of experienced CORE PHP, Laravel developer. **Requirements:** - **Strong Proficiency in Laravel/ core php:** . - **Experience in fixing SQL Injections and security of php files: ** Demonstrable experience in fixing SQL injections and making sure the website is hack-proof - **Experience in Project Upgrades: ** Demonstrable experience in upgrading existing projects, making them more efficient, and integrating new functionalities seamlessly. **Ideal Skills and Experience:** - In-depth knowledge of PHP and Laravel framework. - Proficient in problem-solving and debugging. - Experience in performance tuning. - Ability to handle feature development from conceptualization to deployment. - Strong communication skills in ENGLISH - MUST be available for di...

    $6 / hr (Avg Bid)
    $6 / hr Avg Bid
    126 bids

    ...With an emphasis on elevating performance, squashing bugs, and introducing new features, the successful candidate will play a key role in steering our project towards excellence. **Requirements:** - **Strong Proficiency in Laravel/ core php:** . - **Experience in fixing SQL Injections and security of php files:** Demonstrable experience in fixing SQL injections and making sure the website is hack-proof - **Experience in Project Upgrades:** Demonstrable experience in upgrading existing projects, making them more efficient, and integrating new functionalities seamlessly. **Scope of Work:** **Ideal Skills and Experience:** - In-depth knowledge of PHP and Laravel framework. - Proficient in problem-solving and debugging. - Experience in performance tuning. - Ability to handle...

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    55 bids

    I’m looking for a skilled cybersecurity professional or ethical hacker to thoroughly test the API of our mobile application for vulnerabilities. The API is custom-built using our own PHP framework, and the goal is to strengthen our app by identifying potential security flaws. **What You'll Do:** - Conduct comprehensive vulnerability scanning and penetration testing on our mobile app’s API. - Utilize creative hacking techniques to uncover any weak spots or potential security loopholes. **Access Provided:** - You will be granted full access to the API for the purpose of this assessment. It’s important that you handle this access responsibly and ethically. **Report Requirements:** - Upon completion of your testing, I expect a summary report of vulnerabilities discove...

    $73 (Avg Bid)
    $73 Avg Bid
    13 bids

    I need a few lines of code hacking for adding variables to CMS contents of prestashop

    $23 (Avg Bid)
    $23 Avg Bid
    15 bids

    ...plaintiff in federal court change the address of the defendant corporation from in-state to out of state to meet diversity requirements? 2) Hacking into a privately owned website and placing malware there. Their motive was to squash public knowledge of their illegal and unethical behavior plus give pointers of how to best sue them if there was cause. 3) Civil rights issues because the website hack restricted the site owner's free speech as users' anti-malware software prevented them from visiting it or adversely affected their computers 4) Conspiracy charges because in a large corporation there must have been >1 person approving, planning and hacking. 5) Way of stating/showing sufficient proof for “preponderance of evidence” when all evidence of the h...

    $243 (Avg Bid)
    $243 Avg Bid
    24 bids

    A recent hack, identified through user complaints, has crippled my WordPress website with several users reporting loss of access to their accounts. I'm seeking an experienced IT professional to restore the site's security and functionality. Key tasks include: - repair damaged files and remove new hacker files - Restore user account access to dashboard - add new user and passwords Ideal candidate should have provable expertise in WordPress site security and excellent troubleshooting skills. Knowledge of preventive cybersecurity strategies will be a plus. Speedy resolution of this issue is crucial.

    $193 (Avg Bid)
    $193 Avg Bid
    96 bids

    Dear Sir or Madam I am looking for a reliable partner for pentesting services within the European Union (EU). Our goal is to constantly improve our range of security services to ensure the highest possible security for our customers. Therefore, we would like to expand our team by adding a partner with expertise in performing pentests, identifying and analyzing security vulnerabilities and recommending and improving security measures. Clear and comprehensive communication of the results to our customers is just as important to us as continuous updates on cyber threats and security strategies. We expect our future partner to not only have experience in pentesting, but also excellent reporting and communication skills, a deep technical understanding of computer systems, networks and applica...

    $43 / hr (Avg Bid)
    $43 / hr Avg Bid
    20 bids

    we have a site where we have some issue with redirect hack. We need someone who know how to remove and secure the site from that issue

    $28 (Avg Bid)
    $28 Avg Bid
    36 bids

    I'm in urgent need of an individual who can swiftly tackle a marketing assignment, focusing on advertising strategy. Your tasks will include: - Implementing Marketing Growth hacks for ...include: - Implementing Marketing Growth hacks for 2 org. - SEO optimisation - It should be done in a specific format as mentioned in the doc. Given the urgency, I'm expecting the assignment to be completed within one day. You need to be exceptionally skilled at marketing tasks, and refrain from using any chat GPT as well as don’t wonton any social media marketing strategies or PPC as a growth hack . If you have a knack for strategizing in advertising along with a proven track record in the mentioned areas, I eagerly look forward to working with you. Quick completion is highly ess...

    $43 (Avg Bid)
    $43 Avg Bid
    15 bids

    ...expert in game development, specifically with experience in creating APK, MODs, and Hacks. The project revolves around 'Game ', Here is the link- - Objective: To devise a hack that would allow faster leveling and easier acquisition of necessary items within the game. - Key Skills: Skilled in hacking in-game resources with a comprehensive knowledge of 'Game A'. Experience in modifying existing APKs for gameplay enhancement would be a great plus. - Expected Outcome: A reliable and fully functioning hack program that can effectively alter internal game mechanics to ease gameplay. Please note that all modifications should strictly adhere to ethical considerations and legal regulations. Freelancers with a good understanding of such guidelines

    $11 / hr (Avg Bid)
    $11 / hr Avg Bid
    5 bids

    We have some issues that our site are being redirected to an another site. When users find us on google and trying contacting us by clicking you can see the url is 100% correct, but when users come to our site the user is going to be redirected to another site. We need someone who know the issue and can fix it quickly.

    $31 (Avg Bid)
    $31 Avg Bid
    71 bids

    my client's server was hacked. i need one to help check the server for me. hacker can hack and leave a message on the desktop. i need one who can find the loop hole from the website

    $17 / hr (Avg Bid)
    $17 / hr Avg Bid
    33 bids

    I've noticed some unsettling conduct on my Linux CentOS system that needs investigating. I found numerous unknown files with root owner in my /mnt directory which has prompted my suspicions. Some of these files are executable, and some appear to be bash files. I am looking for a professional experienced with Linux systems, CentOS in...6433 [eventfd] java 21081 fbfashio 12r CHR 1,3 0t0 1028 /dev/null java 21081 fbfashio 13u IPv4 4915797 0t0 TCP :36612->:http (ESTABLISHED) java 21081 fbfashio 35u unix 0xffff989cec7bbfc0 0t0 19877 /opt/alt/php-fpm72/usr/var/sockets/ I want some one to find the root cause of this hack The work will be through Anydesk or teamviewer or similars

    $58 (Avg Bid)
    $58 Avg Bid
    10 bids

    As a hardware enthusiast with a specific interest in the NEC D78F0537 MCU, I'm looking to hack into this hardware for the purpose of data extraction. • Objective: My primary focus is extracting firmware data. • Expertise Required: Looking for a freelancer with a background in hardware hacking. Knowledge and experience working with MCU's is necessary. Having practical experience with the NEC D78F0537/D78K Series would be a significant advantage. • Skills: A deep understanding of the chip architecture and how to extract data from it is a must. The freelancer must be well-versed in understanding potential security vulnerabilities, bypassing them, and successfully extracting the required data. • Deliverables: Successful extraction of the firmware data...

    $30 - $250
    Featured Sealed
    $30 - $250
    5 bids

    I am looking for a JavaScript script for Google Chrome that can extract data from a specific website Functionality: - The script should be able to extract data from webpages - It should automate the task of extracting data from the specified website Website: - The script should be designed to extract...data from webpages - It should automate the task of extracting data from the specified website Website: - The script should be designed to extract data from a specific website that I will provide Skills and Experience: - Proficiency in JavaScript - Experience with Google Chrome extensions or scripts - Knowledge of web scraping techniques Please note that the script should be compatible with Google Chrome and should be able to run smoothly without any issues. The script is to ...

    $483 (Avg Bid)
    $483 Avg Bid
    49 bids

    Hi, I got a wordpress website hacked. The hack leads to redirections to spam websites. The malware only occurs when I click on the website link on the facepage page on a mobile device. Therefore, I guess the malware redirects are activated referrer-based (facebook) and mobile specific (redirects do not happen on desktop). I used Malcare and Wordfence to scan the website. Both found some malware, however after removing the it the problem is still there. I need a IT security expert who can fix this manually. Please tell me which access data you would need. The hosting provider said, they think the database is infected. Looking forward to your offers!

    $140 (Avg Bid)
    $140 Avg Bid
    67 bids

    Hello, I need of a Wordpress expert to fix a spam redirect hack on my website. I need this done asap. I have downloaded a malware plugin and identified that the website is indeed hacked. I can see a few new plugin folders that shouldn't be there, but haven't searched database / PHP for infected strings. I have the option for an automated cleanup using MalCare, but their price is way too high for this. Requirements: - Must have experience in identifying and fixing spam redirect hacks in Wordpress. - Should be able to restore the website to its original state without any data loss, as I do not have a backup of the site before the hack. - Immediate availability to resolve the issue is a must. Skills and experience required: - Strong knowledge of Wordpress secu...

    $33 (Avg Bid)
    $33 Avg Bid
    39 bids

    Disclaimer: This project objective is NOT to harm/hack devices. This project objective is to test if latest patch in IOS 17.2+ is actually working or if there is some other way to make iphone crash by BLE. All the tests will be performed on my private iphone device. App isn't going to be used against other devices, also its NOT going to be able to hack/harm devices. I'm looking for a skilled and experienced professional who will assist me in demonstrating a proof of concept related to a BLE spam crash, specifically for iOS versions 17.2+. This project does not favor a particular programming language; any language that can effectively work on Android would suffice. Ideal Skills: - Proficient with iOS platform and its various versions, especially iOS 17.2+ - Experie...

    $161 (Avg Bid)
    Featured
    $161 Avg Bid
    9 bids
    Trophy icon I need two graphics Ended

    I am looking for a graphic designer to create Ebook cover me. The ebooks are called the 24hour TransUnion Hack. The other is called the 24hour Experian Hack You can add your own creativity to this cover. You can try doing someone looking as if they are hacking the matrix with the logo for Experian on that book cover and the same for the TransUnion book cover as well. I am on a time crunch so place your best work because I will be choosing the winner at 8am EST today 1/5 8AM EST I WILL ADD A TIP FOR THE WINNER!!

    $35 (Avg Bid)
    Guaranteed
    $35
    121 entries